Completed
Push — master ( abc370...970ae4 )
by Tim
22s queued 18s
created
src/WebAuthn/WebAuthnRegistrationEvent.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -499,7 +499,7 @@  discard block
 block discarded – undo
499 499
     }
500 500
 
501 501
     // Keymaster 3 - KeyMint ???
502
-    private const ORIGINS_3 = [ // https://source.android.com/docs/security/features/keystore/tags#origin
502
+    private const ORIGINS_3 = [// https://source.android.com/docs/security/features/keystore/tags#origin
503 503
         0 => "GENERATED",
504 504
         1 => "DERIVED",
505 505
         2 => "IMPORTED",
@@ -728,7 +728,7 @@  discard block
 block discarded – undo
728 728
          * STEP 13 of the validation procedure in § 7.1 of the spec: is the algorithm the expected one?
729 729
          */
730 730
         if (in_array($arrayPK['3'], self::PK_ALGORITHM)) { // we requested -7 or -257, so want to see it here
731
-            $this->algo = (int)$arrayPK['3'];
731
+            $this->algo = (int) $arrayPK['3'];
732 732
             $this->pass("Public Key Algorithm is expected (" .
733 733
                 implode(' or ', WebAuthnRegistrationEvent::PK_ALGORITHM) .
734 734
                 ").");
Please login to merge, or discard this patch.
src/Controller/AuthProcess.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -154,7 +154,7 @@  discard block
 block discarded – undo
154 154
             base64_decode($request->request->get('client_data_raw')),
155 155
             $oneToken[0],
156 156
             $oneToken[1],
157
-            (int)$oneToken[4], // algo
157
+            (int) $oneToken[4], // algo
158 158
             base64_decode($request->request->get('signature')),
159 159
             $debugEnabled,
160 160
         );
@@ -217,7 +217,7 @@  discard block
 block discarded – undo
217 217
 
218 218
         if ($debugEnabled) {
219 219
             $response = new RunnableResponse(
220
-                function (WebAuthnAuthenticationEvent $authObject, array $state) {
220
+                function(WebAuthnAuthenticationEvent $authObject, array $state) {
221 221
                     echo $authObject->getDebugBuffer();
222 222
                     echo $authObject->getValidateBuffer();
223 223
                     echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ?
@@ -248,7 +248,7 @@  discard block
 block discarded – undo
248 248
              * In passwordless, we're on our own. The one thing we know is the
249 249
              * username.
250 250
              */
251
-            $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $state['FIDO2Username'] ];
251
+            $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$state['FIDO2Username']];
252 252
             // in case this authentication happened in the Supercharged context
253 253
             // it may be that there is an authprocfilter for WebAuthN, too.
254 254
 
@@ -266,7 +266,7 @@  discard block
 block discarded – undo
266 266
             }
267 267
             // set an internal "authenticated passwordless" hint somewhere else
268 268
             // in $state, which the authproc can react upon
269
-            $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [ $state['FIDO2Username'] ];
269
+            $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [$state['FIDO2Username']];
270 270
 
271 271
             $this->authState::saveState($state, 'webauthn:request');
272 272
 
Please login to merge, or discard this patch.
src/Controller/WebAuthn.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -101,7 +101,7 @@
 block discarded – undo
101 101
             }
102 102
             return self::STATE_AUTH_ALLOWMGMT;
103 103
         } else { // in inflow, allow to check the management box; otherwise,
104
-                 // only auth
104
+                    // only auth
105 105
             $moduleConfig = Configuration::getOptionalConfig('module_webauthn.php')->toArray();
106 106
             return $moduleConfig['registration']['use_inflow_registration'] ?
107 107
                 self::STATE_AUTH_ALLOWMGMT : self::STATE_AUTH_NOMGMT;
Please login to merge, or discard this patch.
src/Auth/Process/WebAuthn.php 1 patch
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -151,8 +151,8 @@
 block discarded – undo
151 151
         $session = Session::getSessionFromRequest();
152 152
         $lastSecondFactor = $session->getData("DateTime", 'LastSuccessfulSecondFactor');
153 153
         if // do we need to do secondFactor in interval, or even every time?
154
-           // we skip only if an interval is configured AND we did successfully authenticate,
155
-           // AND are within the interval
154
+            // we skip only if an interval is configured AND we did successfully authenticate,
155
+            // AND are within the interval
156 156
         (
157 157
                 $this->SecondFactorMaxAge >= 0 && $lastSecondFactor instanceof \DateTime
158 158
         ) {
Please login to merge, or discard this patch.